perm_phone_msgUNDER ATTACK? Chat With US

Month: December 2019

11 Results / Page 1 of 2

Background

todayDecember 31, 2019

  • 11
close

Cybercrime BCyber

What are Beckstrom’s Laws of Cyber Security?

The Internet of Things (IoT) has many defining characteristics, such as tiny, cheap and low power sensors, embedded computers, and connectivity. But one characteristic will rule them all, namely, security. In the very near future, the IoT will probably not exist if it isn’t secure. Beckstrom’s Laws of Cyber Security ...

todayDecember 31, 2019

  • 9
close

Cyber insurance BCyber

What is Beckstrom’s Laws of Cyber Security?

The Internet of Things (IoT) has many defining characteristics, such as tiny, cheap and low power sensors, embedded computers, and connectivity. But one characteristic will rule them all, namely, security. In the very near future, the IoT will probably not exist if it isn’t secure. Beckstrom’s Laws of Cyber Security ...

todayDecember 30, 2019

  • 12
close

Cyber insurance BCyber

What are the qualities of a good digital identity management program? – Help Net Security

Growing consumer expectations, the breakdown of traditional “walls” and emerging technologies are making it hard for organizations to devise a successful digital identity management program, according to Deloitte. More than ever before, identity management is at the center of cybersecurity, regulatory compliance and consumer trust, and many organizations are struggling ...

todayDecember 28, 2019

  • 16
close

Cyber security BCyber

The FireEye Approach to Operational Technology Security

Today FireEye launches the Cyber Physical Threat Intelligence subscription, which provides cyber security professionals with unmatched context, data and actionable analysis on threats and risk to cyber physical systems. In light of this release, we thought it would be helpful to explain FireEye’s philosophy and broader approach to operational technology ...

todayDecember 27, 2019

  • 18
close

Global news BCyber

Businesses are hiding data breaches behind cybersecurity NDAs

European firms are covering data breaches and possibly avoiding multi-dollar fines under the guise of non-disclosure agreements (NDAs), according to cybersecurity firms speaking to .  READ NEXT Europe’s GDPR (General Data Protection Regulation) legislation came into effect in May 2018 and has since then already led to landmark fines, such ...

todayDecember 27, 2019

  • 11
close

Cyber insurance BCyber

How to get started with security response automation on AWS

At AWS, we encourage you to use automation to help quickly detect and respond to security events within your AWS environments. In addition to increasing the speed of detection and response, automation also helps you scale your security operations as you expand your workloads running on AWS. For these reasons, ...

todayDecember 26, 2019

  • 13
close

Cyber insurance BCyber

Lessons from the NSA: Know Your Assets

Lessons from the NSA: Know Your Assets Over the past decade, Chris Kubic has worked to secure the US intelligence community’s information systems and environment, architected the National Security Agency’s cloud infrastructure, and, for his past three years, led the agency’s network-security efforts as the chief information security officer.  His lessons ...

todayDecember 26, 2019

  • 14
close

Cyber insurance BCyber

Why cybersecurity needs to focus more on customer endpoints going forward

Cloud-based endpoint protection platforms (EPP) are proliferating across enterprises today as CIOs and CISOs prioritise greater resiliency in their endpoint security strategies going into 2020 There’s a surge of activity happening right now in enterprises that are prioritising more resiliency in their endpoint security strategies going into 2020. The factors ...